GSM bugs are covert listening devices which, in order to transmit their intelligence, use the mobile phone network, thanks to a SIM card installed on them.

Among the endless possibilities offered by the eavesdropping devices market, the usage of a GSM bug has become more and more widespread, especially in the last few years, thanks to the possibility of carrying out surveillance operations without distance limits or radio coverage problems, this safeguarding the listener’s security and privacy, as he will no longer need to be hidden nearby but will be able to be sitting literally anywhere.

The increasing popularity of GSM bugs is due to the fact that they only come with advantages, such as the clarity of their signal (thanks to the digital network), the possibility of sending said signal worldwide just like you would do with a normal phone call, and all this without having to use any particular receiving device other than a normal mobile phone.

Our GSM-001 listening device is made up of a small shell with two cables, used to power the device and to connect it to a microphone with high sensitivity features. On the inside, along with the housing where the SIM card is placed, you can find a processor which manages all of the bug
‘s functionalities.

Generally, for all other covert listening devices based on GSM technology, one has to call the SIM card’s phone number to start listening in. In this case, the device is equipped with a high-sensitivity automatic activation sensor, which makes it possible to have the bug place a call towards a preset number. This happens when its built-in sensor detects a movement, a sound or, if planted inside a car, when the vehicle is started.

Furthermore, programming the settings can be done without being physically near the bug, as you just need to send a simple text message in a particular format, to make sure that the processor reads it as an operating command, enabling or disabling the relevant functions, or setting the sensitivity level of either the microphone or the sensor.

By sending an SMS it will be possible not only to change settings of the various functions, but also to reset the bug, in order to prevent it from being intercepted by any bug sweeping devices nearby. We will also be able to set up the telephone numbers enabled to control the bug, those towards which it will send a text notification, or those to be automatically called as soon as the sensor detects a motion.

You can also send a simple SMS to receive directly on your phone a report, where you will see the status of all functionalities installed on your GSM listening device.

Once you get hold of your bug, you also have to get to know the characteristics of the place where you intend to plant it, as well as the duration of the surveillance operation, in order to choose the most suitable power option for our needs. In fact, if the bug will have to stay away from us for a long time, or if we need a continuous monitoring, we will have to power it through the mains, in order to avoid performance gaps caused by a low or exhausted battery.

We will not have this kind of problem if our surveillance operation is a short-term one (up to one week), and non continuous, as in this case a normal 9V battery will be more than enough. Once the location and the power option of your bug have been set up, we will have to set up the usage mode.

At this point we will have to choose whether we will be calling our bug, or it will be calling us. Also, if installed inside a vehicle, we will have to choose whether we want or not to receive an SMS notification as soon as the car’s engine is started or stopped.

In order to make all this possible, we will have to choose the phone numbers that are enabled to call our bug to listen to the conversations around it, or those towards which the bug will call directly as soon as its sensor picks up a motion or a voice. For bugs planted inside a vehicle, we will have to set up the number towards which a notification must be sent in this case.

At the same time, you can set the sensitivity level of the activation sensor, in order to minimize the possibility of false alarms, caused by some noise coming from outside. For each of these functions, a maximum of three numbers enabled to control the device can be set.

Along with all the functions highlighted above, by sending a simple SMS you can run several utilities, such as restarting the bug, resetting it to factory settings, switching it off to prevent it from being detected by bug sweepers, enabling or disabling the flashing LED light, or setting up callback options in case of line failure.

In a few words, as you can see, by using a GSM bug you have at your disposal a faithful friend for your surveillance operations, with a high degree of flexibility that allows you to tailor its usage to best suit your needs, to make sure that success is achieved without any risk!

Cyber Technology, an Australian manufacturer of UAV (Unmanned Aerial Vehicles) has just introduced its latest creation, a radio controlled mini helicopter equipped with four rotors for a higher maneuverability, which make it suitable for being used in urban environments where space is tight.

This micro helicopter goes by the name of CyberQuad, and it sports four ducted rotors, with the duct acting as a protection which allows usage even indoors, without danger that the rotors might hurt someone. This kind of rotors generally requires a higher focus on stabilization equipment, and generally has a shorter operating range and a lower payload capacity when compared to a helicopter.

CyberQuad’s peculiar structure brings together the small size and the safety of ducted rotors, with agility and ease of use of a normal mini helicopter. It can carry a payload of up to 1.5 Kg of video and photo cameras, or sensors for detection of harmful gases or polluting agents, and its rotors are not generating any sparkles, allowing for use even in presence of flammable gases, for example as a support to fire squads on rescue operations or while fighting a fire.

Just like a normal helicopter, CyberQuad has vertical takeoff and landing, and its limited size (53x53x16 cm) and weight allow for easy transportation and operation. Its peak speed is approximately 65 kilometers per hour, and it can fly for a period between 25 and 40 minutes.

The Russian designer Art Lebedev is famous for his extravagant but useful concepts, such as for example Transparentius, a large screen mounted on the back of a transport truck and connected to a camera placed on the front, which allows car drivers behind the truck to see what’s beyond the truck, minimizing the risk of accidents when overtaking.

Lebedev’s latest gadget is a concept called Fleximus, a flexible camera equipped with a tube that can be used either stand-alone or connected to a module sporting an LCD display.
At the current stage, Fleximus is merely a project, so no technical specifications of any kind have been made public, but on the ingenious designer’s website you can see the development steps.

Once a toy like this should enter mass production, it may not be just a gadget to surprise your friends, but a useful tool to take snapshots or to examine points which are normally hard to reach; for example, a mechanic might find it extremely useful to inspect corners of an engine under maintenance, and a plumber might use it to look into a leaking pipe.

In our specific field of surveillance, it might be a useful tool to gather evidence and take pictures without being noticed or arising suspicion: who could think that that strange tube is actually a camera?

Of course, since the flexible camera is still in the conceptual phase, and we do not know if it will ever be released, along with specifications the manufacturer has not released any information on retail price, but something tells me that it would not come cheap…

How many times did we find ourselves wishing we could listen to what our colleagues in the next room are saying, to find out what they really think about us? Or that we could spy on our annoying neighbor to expose his strange (or even illegal) habits?

In many cases, having the chance to listen to what is said behind a wall can be useful not only to protect yourself in cases of office power struggle, or to make sure that your spouse is really faithful, but also to prevent or expose corporate espionage, or even to frame dangerous criminals.

To do it securely, modern technology lends us a hand, thanks to wall microphones, the digitally enhanced version of our doctor’s stethoscope; in fact, in most cases, this kind of microphone is made up of a stethoscope, connected to a small but powerful amplifier which augments its sensitivity and allows the stethoscope, by analyzing the vibrations caused by human voice against any wall, to listen to what is being said in the next room.

For an even more accurate listening operation, you can use a window microphone, that is, a transmitting device which, when placed on the outer glass of a window, uses the same principle to read vibrations of glass and intercept conversations behind it, transmitting them towards a receiver placed up to a few hundred meters away.

As you can imagine, this particular kind of devices is more suitable for professional users, such as detective agencies or law enforcement, or in any case, for people who want to get the best out of their eavesdropping operation, while minimizing any possible risk connected with planting hidden bugs.

The BBC has reported yesterday that the infantry of Her British Majesty’s Army will be equipped, starting from the month of March 2010, with a new camouflage suit that will replace the one that has been used for more than 40 years without any change.

The MTP (Multi terrain Pattern) model, identified by number 40, will gradually replace the old model number 8, called DPM (Disruptive Pattern Material), which will be out of service within 2011, the scheduled time limit for the entire Army to be upgraded.

The new camouflage suit will initially be used in the Afghan theatres of operations where the British Army is deployed. In certain areas where Her Majesty’s soldiers are on duty, the terrain’s morphology can dramatically change within a few miles, therefore a suit which works well in a green zone may turn out useless, if not dangerous, in desert areas where the predominant shade is grey.

The new suit is a good compromise between a terrain-specific kind of design and an all-rounder suitable for diverse environments. Afghanistan, under this point of view, is a harder challenge than Iraq, where the soldiers’ uniforms are mostly woven in colors suitable for hiding on sand.

It has been tested on various terrains in different parts of the world (including Afghanistan itself) before the final approval went to Model 40. The soldiers who have participated in the tests have given an extremely positive feedback, as according to their experience, the new camouflage suit will “make it harder for them to be seen, making their job easier”.

The British manufacturer BAE Systems has just signed a 42-million dollar deal with the US Ministry of Defense, to supply the US Army with a laser-based target location system, which also works thanks to GPS technology.

This system, which thanks to its configuration is suitable to work in all environmental and weather conditions, or even at night and in conditions of low lighting, is called LTLM (Laser Target Locator Module), and is equipped with a normal optical system for daylight view, as well as an infrared camera for night vision, a digital compass and a GPS receiver; all this technology is packed within a weight just below 2.5 kilograms.

Thanks to the possibility of using LTLM, troops will be able to detect and pinpoint targets at a maximum distance of over 4 kilometers during the day, and approximately 900 meters during night time.
By using it, not only they will be able to detect enemy targets with speed and accuracy, but they will also be able to do it in secure conditions, while saving on weight of the equipment they carry, thus allowing for a better freedom of movement, which in turn translates into a higher flexibility level and a shorter response time in case of enemy threats.

Thanks to it, US armed forces are taking another step forward towards the improvement of their troops’ operating conditions in difficult environments.
The contract signed with BAE Systems includes delivery of an amount of laser pointers up to 200 items per month, for a period of at least 5 years, which means that the total gross value of the supply would exceed 300 million dollar over this period.

Our elderly parents, grandparents or relatives, sometimes, may not be able to enjoy a healthy and peaceful winter of life, but they might rather be suffering from degenerative illnesses, typical of old age, such as Alzheimer’s disease.

We all know how cunning this disease is, and how it strikes not only the patients’ body and nerve system, but also his pride and morale, forcing them to do things they would not normally do, such as unconsciously leaving their home and getting lost, thus having trouble finding their way back.

Fortunately, in cases like these, technology comes to the rescue and supports patients and their caretakers, either family members or professional hospital personnel. Thanks to Trusty Bip, the Alzheimer patient locator, it is possible to follow our loved ones, or the people under our responsibility, and receive an instant alert if they exceed a certain preset distance.
The system is made up of a bracelet with transceiver, which can be placed on the wrist or ankle, and a receiver which can handle up to 40 transceivers (and patients) at the same time. If the Alzheimer patient leaves the place, as soon as he reaches a certain distance the bracelet will send an alert to the receiving station, where its position can be displayed, allowing for immediate action to bring him back to safety.

This tracking system allows both the patient and the caretaker to live this condition easily, without adding further to the stress of a difficult situation. Furthermore, Trusty Bip can be used for other purposes as well, like locating pets or cattle, if you have a large property and can not keep your eyes on all of them at the same time. In short, this is a solution to take care of our loved ones, either with two or four legs!

A study carried out by researchers at University of California in Los Angeles has demonstrated that, at least theoretically so far, it is possible to create, developing human blood stem cells, a particular type of modified cells that detect and kill cells infected with HIV virus. In practice, it will be like having a genetic virus, useful not only to fight AIDS, but also in the struggle against several chronic viral diseases.

The killer cell, called CD8, has been initially extracted from a patient infected with HIV, and the molecule which detects and kills infected cells has been identified. These modified cells are capable of killing only a small part of the viral cells present inside the human body.

To make them more numerous and stronger, they have been cloned by implanting them into mice, allowing for development of a range of cells which can locate and destroy other cells which contain HIV virus proteins.
The next step will involve testing of the system on a more advanced model, in order to be able to determine and predict the results on the human body.

So far, studies have given very positive potential results, and researchers hope to be able to broaden the range of action, to fight other viruses. In fact, these studies can be used as a starting point for further future developments, especially concerning the possibility of repairing a damaged immune system, after it has been damaged following an infection by a virus causing a chronic disease, or even following to some types of tumor.

As children, we all dreamed of being able to fly one day. Unfortunately this is not yet possible with our human capabilities, but thanks to military technology assisting paratroopers, those who want to feel the thrill of flying in a natural way and without an engine have the possibility of experiencing a feeling that is close to what birds might feel during flight.

All this thank to the Gryphon parachute, developed by the Spelco consortium, which also manufactures a wide range of equipment for parachuting, such as helmets and oxygen supplies.
Despite not being equipped with an engine, Gryphon sports an electronic guidance and navigation system, housed in a stealth type shell which makes it invisible for radars.

The flying parachute allows its user to glide in all directions (except upwards, of course) at a speed around 90 kilometers per hour. Gryphon’s project team have stated that this system is designed for high altitude and high opening missions, where a normal parachute is opened at high altitudes and used to glide downward.

Thanks to Gryphon and to its high maneuverability, it is now possible to achieve a 5:1 glide ratio, which means that, if a paratrooper jumps out of the plane at a 5000 meters altitude, he will be able to glide up to a distance of 25 kilometers.
A possibility for further improvement of the system might come from the application of a small engine to the Gryphon, which would allow it not only to glide downwards for a longer distance, but also to fly upwards.

By doing this, the ancient dream of finally being able to fly might be one step closer, at least for paratroopers of the 21st century!

For those running a business where information is vital and it is also vital that the information stays confidential, the risk of being intercepted is always present. Modern technology offers a wide range of possibility to prying ears wishing to secretly listen to someone else’s conversations.

You will be certainly wondering “how to understand if my phone is bugged?”. there is no definite answer, as spy phones, even after a closer look, can not be told from a normal cellphone. Nowadays, thanks to the installation of a specific software, it is the phone itself which allows a third party to listen in real time to all your incoming or outgoing calls, as well as to read every sent or received text message, or listen to the conversations taking place around the phone, even while it is switched off!

Furthermore, if the spy phone is equipped with GPS navigation system, it can also send your position’s geographical coordinates at any time. All this happens thanks to a completely invisible piece of software, installed directly on the mobile phone’s processor, which does not give out any visible sign of activity and that can be controlled remotely via SMS.

So, if your phone is being bugged, the only way you have to find out is if the person who is spying on you gives out details that they may not possibly know if not by listening to your calls. If you think that something smells fishy, we can advise you to consult an expert of audio surveillance, for example Endoacustica with its several years of experience in this field.

Text ADS

A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.

Wall microphones able to listen through walls thick even up to 70 cm.
Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.

The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …